Works Published in 2022

search works

Displaying works 1 - 20 of 84 in total

Sorted by most recent date added to the index first, which may not be the same as publication date order.

2022 conference paper

Removing the Reliance on Perimeters for Security using Network Views

Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 151–162.

By: I. Anjum, D. Kostecki, E. Leba, J. Sokal, R. Bharambe, W. Enck, C. Nita-Rotaru, B. Reaves

Source: ORCID
Added: January 2, 2024

2022 chapter

Optimizing Honey Traffic Using Game Theory and Adversarial Learning

In Cyber Deception: Techniques, Strategies, and Human Aspects (pp. 97–124). Springer.

By: M. Miah, M. Zhu, A. Granados, N. Sharmin, I. Anjum, A. Ortiz, C. Kiekintveld, W. Enck, M. Singh

Source: ORCID
Added: January 2, 2024

2022 conference paper

A Study of Application Sandbox Policies in Linux

Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies, 19–30.

By: T. Dunlap, W. Enck & B. Reaves

Source: ORCID
Added: January 2, 2024

2022 conference paper

${$FReD$}$: Identifying File ${$Re-Delegation$}$ in Android System Services

31st USENIX Security Symposium (USENIX Security 22), 1525–1542.

By: S. Gorski III, S. Thorn, W. Enck & H. Chen

Source: ORCID
Added: January 2, 2024

2022 conference paper

${$ALASTOR$}$: Reconstructing the Provenance of Serverless Intrusions

31st USENIX Security Symposium (USENIX Security 22), 2443–2460.

By: P. Datta, I. Polinsky, M. Inam, A. Bates & W. Enck

Source: ORCID
Added: January 2, 2024

2022 article

Contact-Free Simultaneous Sensing of Human Heart Rate and Canine Breathing Rate for Animal Assisted Interactions

NINTH INTERNATIONAL CONFERENCE ON ANIMAL-COMPUTER INTERACTION, ACI 2022.

author keywords: human-canine interaction; contact-free physiological sensing; computer vision; signal processing
TL;DR: This preliminary effort toward a contact-free approach to facilitate AAI assessment via the physiological sensing of humans and canines using consumer-grade cameras focuses on verifying the technological feasibility of remotely sensing the heart rate signal of the human subject and the breathing rates of the dog subject while they are interacting. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: December 18, 2023

2022 article

Analysis of Payment Service Provider SDKs in Android

PROCEEDINGS OF THE 38TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, ACSAC 2022, pp. 576–590.

TL;DR: The proposed AARDroid is proposed for statically assessing payment SDKs against OWASP’s MASVS industry standard for mobile application security, and the value of applying security analysis at the SDK granularity is demonstrated to prevent the widespread deployment of insecure code. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: October 16, 2023

2022 journal article

Digital Transformation in Higher Education: 7 Areas for Enhancing Digital Learning

Educause Review. https://er.educause.edu/articles/2022/9/digital-transformation-in-higher-education-7-areas-for-enhancing-digital-learning

By: F. Martin & K. Xie

Source: NC State University Libraries
Added: October 7, 2023

2022 journal article

Systematic Review of Research on Graduate Online Education from 2000 to 2020

Quarterly Review of Distance Education, 23(2), 41–60.

By: F. Martin, J. Morse & S. Kumar

Source: NC State University Libraries
Added: October 7, 2023

2022 conference paper

Reviews of Research on Online Learners

Proceedings of the Association for Educational Communications and Technology (AECT) 2022 Annual International Convention. Presented at the Association for Educational Communications and Technology (AECT) 2022 Annual International Convention, Las Vegas, NV.

By: L. Olesova, A. Sadal, S. Kumar, F. Martin, A. Ritzhaupt, C. Bonk, P. Lwenthal, C. Snelson, C. Westine

Event: Association for Educational Communications and Technology (AECT) 2022 Annual International Convention at Las Vegas, NV

Source: NC State University Libraries
Added: October 7, 2023

2022 journal article

Systematic Review of Predictive Learning Analytics Using Online Learning Engagement Data

Korean Association for Educational Information and Media, 28(4), 903–927.

By: Y. Cho, Y. Han & F. Martin*

Sources: Crossref, NC State University Libraries
Added: October 1, 2023

2022 journal article

Examining Pre-Service and In-Service Teachers’ Perceptions of Their Readiness to Use Digital Technologies for Teaching and Learning

Computers in the Schools, 40(1), 22–55.

TL;DR: A need to further examine how pre-service and in-service teachers’ beliefs about digital technologies influence their process of designing instruction and choosing whether to or how to use these technologies in their classrooms is indicated. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: October 1, 2023

2022 article

Towards Resilient Analog In-Memory Deep Learning via Data Layout Re-Organization

PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 859–864.

TL;DR: The XORG framework is proposed that performs data layout organization for DNNs deployed on in-memory computing platforms and improves precision by optimizing the weight matrix to crossbar assignments at compile time. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: September 11, 2023

2022 article

Apple vs. EMA Electromagnetic Side Channel Attacks on Apple CoreCrypto

PROCEEDINGS OF THE 59TH ACM/IEEE DESIGN AUTOMATION CONFERENCE, DAC 2022, pp. 247–252.

By: G. Haas n & A. Aysu n

TL;DR: This work implements an optimized side channel acquisition infrastructure involving both custom iPhone software and accelerated analysis code and finds that an adversary which can observe 5--30 million known-ciphertext traces can reliably extract secret AES keys using electromagnetic (EM) radiation as a side channel. (via Semantic Scholar)
Source: Web Of Science
Added: September 11, 2023

2022 conference paper

Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects

Committed to Trust: A Qualitative Study on Security & Trust in Open Source Software Projects. 43rd IEEE Symposium on Security and Privacy (IEEE S&P 2022).

By: D. Wermke, N. Wöhler, J. Klemmer, M. Fourné, Y. Acar & S. Fahl

Source: ORCID
Added: August 15, 2023

2022 conference paper

If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers

Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022).

By: N. Huaman, A. Krause, D. Wermke, J. Klemmer, C. Stransky, Y. Acar, S. Fahl

Source: ORCID
Added: August 15, 2023

2022 article

Mismatched Estimation in the Distance Geometry Problem

2022 56TH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS, AND COMPUTERS, pp. 1031–1035.

By: M. Abdelkhalek n, D. Baron n & C. Wong n

TL;DR: This paper argues that more accurate estimates can be obtained when an estimation procedure that uses the correct likelihood function of noisy measurements is performed, and demonstrates that least-squares estimates could be suboptimal by several dB. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: June 5, 2023

2022 article

ATHENA: Enabling Codesign for Next-Generation AI/ML Architectures

2022 IEEE INTERNATIONAL CONFERENCE ON REBOOTING COMPUTING, ICRC, pp. 13–23.

author keywords: Machine Learning; Codesign Tools; Neuromorphic Computing; codesign
TL;DR: This work presents a codesign ecosystem that leverages an analytical tool, ATHENA, to accelerate design space exploration and evaluation of novel architectures. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Source: Web Of Science
Added: May 30, 2023

2022 article

Hey Alexa, Who Am I Talking to?: Analyzing Users' Perception and Awareness Regarding Third-party Alexa Skills

PROCEEDINGS OF THE 2022 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI' 22).

By: A. Sabir n, E. Lafontaine n & A. Das n

author keywords: Voice assistant; Third-party skills; Security indicators
TL;DR: An interactive user study where participants listen to and interact with real-world skills using the official Alexa app finds that most participants fail to identify the skill developer correctly and cannot correctly determine which skills will be automatically activated through the voice interface. (via Semantic Scholar)
UN Sustainable Development Goal Categories
4. Quality Education (OpenAlex)
Source: Web Of Science
Added: May 1, 2023

2022 article

Transpose-Xen: Virtualized Mixed-Criticality through Dynamic Allocation

37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, pp. 3–12.

By: J. McFarland n & A. Awad n

author keywords: Hypervisor; Dynamic Allocation; Real-Time Scheduling; Cloud Computing
TL;DR: This paper proposes Transpose-Xen, an adaptive hyper-visor scheduler capable of managing the scheduling of tasks of varying levels of criticality, including tasks with hard real-time constraints, which is able to execute multiple jobs of varying criticality by finding similarities between the resource needs of each task despite potentially executing from separate VMs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Source: Web Of Science
Added: April 4, 2023

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.